With DroidGPT, Endor Labs applies generative AI to software development to ensure open-source packages are current and secure.
Cybersecurity
In this special “on location” minute, Paul Swider shares his impressions from the third day of the HIMSS 2023 Global Health Conference and Exhibition in Chicago.
Threat intelligence gathers and utilizes data about potential threats to keep corporate data safe. It’s especially useful in a multicloud scenario.
Tony Uphoff shares his five top takeaways from the recent Digital CIO Summit, recommending some relevant on-demand sessions along the way.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
The release of Microsoft’s Security Copilot is only the beginning of generative AI use cases for cybersecurity tooling, says Chris Hughes.
Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.
ChatGPT may be getting a lot of attention, but generative AI-powered deepfakes have been around for a while, and security teams can’t forget this riskier side of the technology, says Rob Wood.
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
John Granger, SVP, IBM Consulting, explains how automating business processes can deliver beneficial outcomes and create opportunities.
The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
As a business leader today, your success relies on accurate data, real-time analytics, and actionable intelligence. Here are the tools to help you.
Janet Schijns talks about managed service providers and how they can reduce your costs while providing advanced IT skills.
Security teams can assist with financial automation projects that often require third-party tools. Rob Wood has some tips on how to select them.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
Embracing digital transformation, cybersecurity, energy-efficent infrastructure, and relevant data and systems helps meet sustainability goals.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
In a statement, Lookout exec explains the data collection practices of TikTok and other mobile apps, cites need for awareness of mobile apps’ risk.